Mail:  Username:  Password:   Help | Sign Up
Search: 

Account Morphing

Discovered By: Red Ryder & Happy Hardcore
Date: August-September 1995
Patched: 1st time September 1995/ 2nd time October 1995

Perhaps the biggest token exploit ever to occur on AOL. This led to several other key exploits and hacks of the time. Which leaves no doubt that 1995 was the most astonishing year of AOL hacks ever.

While signed onto an AOL account. It was possible to send the porch tokens Dd/Dp etc and sign onto another AOL account without signing off the first one. This trick was not useful until it was discovered that by sending the porch tokens in a certain manner it was possible to sign onto any account without knowing the password.

The main token which allowed this was the Dg Guest token. The way AOL's host side buffer system worked at the time was that with the Dg token even if you got the password wrong the Screen Name you entered would still be stored on on AOL's host side. For example, you would sign onto an AOL account you have the password to, then send the Dg token with the sn you want to get on and an invalid password. As soon as Dg is sent, your current sn changes and your mailbox and everything else updates to the sn you sent with the Dg token. Thus, you morphed into an account you didn't give a password to.

The first flavor of the exploit was patched by AOL in early September after dozens of Mac hax0rs went on a rampage signing onto several AOL employee accounts. However, using the Dp token, Happy Hardcore was again able to open up this exploit. This exploit stayed alive until mid October when Hardcore told an employee how to fix the hole.

Contributed By: O0O and Hypah

Submit New Entry   Corrections/Additions


Articles
| Documents | Tools | FDO | Atoms | Tokens | Security Breaches

© 2000 BMB and Tau Productions. Contacts: BMB | Tau | Rob